Displaying 20 results from an estimated 33 matches for "syslog_level_info".
2001 Jul 05
1
OpenSSH Logging Madness
...dd a new LogLevel corresponding to the LOG_NOTICE syslog level.
- Then modify OpenSSH to log to LOG_NOTICE only these events:
- login failures
- login successes
Specifically, please:
- add a new element to the LogLevel enum, say, 'SYSLOG_LEVEL_NOTICE',
between 'SYSLOG_LEVEL_INFO' and 'SYSLOG_LEVEL_ERROR', in log.h
- add a new logging function to log.c called notice(), much like log(),
verbose() and friends, but logging to SYSLOG_LEVEL_NOTICE.
- modify log.c:do_log() to map SYSLOG_LEVEL_NOTICE to LOG_NOTICE.
- modify auth.c:/auth_log() to use notice() i...
2001 Jan 05
3
subject: ssh non-intuitive logging setting. (priority names)
...LogLevel val;
} log_levels[] =
{
{ "QUIET", SYSLOG_LEVEL_QUIET },
{ "FATAL", SYSLOG_LEVEL_FATAL },
{ "ERROR", SYSLOG_LEVEL_ERROR },
{ "INFO", SYSLOG_LEVEL_INFO },
{ "VERBOSE", SYSLOG_LEVEL_VERBOSE },
{ "DEBUG", SYSLOG_LEVEL_DEBUG1 },
{ "DEBUG1", SYSLOG_LEVEL_DEBUG1 },
{ "DEBUG2", SYSLOG_LEVEL_DEBUG2 },
{ "DEBUG3"...
2002 Dec 18
2
patch for openssh3.5p1 - adds logging option
...sh-3.5p1-orig/log.c openssh-3.5p1/log.c
--- openssh-3.5p1-orig/log.c 2002-12-18 10:10:13.000000000 -0500
+++ openssh-3.5p1/log.c 2002-12-18 11:51:24.000000000 -0500
@@ -40,6 +40,7 @@
#include "xmalloc.h"
#include <syslog.h>
+#include <time.h>
static LogLevel log_level = SYSLOG_LEVEL_INFO;
static int log_on_stderr = 1;
@@ -48,6 +49,8 @@
extern char *__progname;
+FILE *logf;
+
/* textual representation of log-facilities/levels */
static struct {
@@ -261,7 +264,8 @@
*/
void
-log_init(char *av0, LogLevel level, SyslogFacility facility, int on_stderr)
+log_init(char *av0,...
2001 Apr 12
1
ssh's readconf.c debug() goes to /dev/null
...ebug("Reading configuration data %.200s", filename);
---
Goes to /dev/null.
This is caused by the fact, that in ssh.c there is:
---
/*
* Initialize "log" output. Since we are the client all output
* actually goes to stderr.
*/
==> log_init(av[0], SYSLOG_LEVEL_INFO, SYSLOG_FACILITY_USER, 1);
/* Read per-user configuration file. */
snprintf(buf, sizeof buf, "%.100s/%.100s", pw->pw_dir, _PATH_SSH_USER_CONFFILE);
read_config_file(buf, host, &options);
/* Read systemwide configuration file. */
read_config...
2013 Jan 04
16
[Bug 2057] New: ssh should treat "Received disconnect" messages as errors
https://bugzilla.mindrot.org/show_bug.cgi?id=2057
Bug ID: 2057
Summary: ssh should treat "Received disconnect" messages as
errors
Classification: Unclassified
Product: Portable OpenSSH
Version: -current
Hardware: All
OS: All
Status: NEW
Severity: minor
Priority:
2001 Jan 04
2
Patch to allow openssh-2.2.0-p1 to be started from /etc/inittab
...int noclose);
+
#endif /* _BSD_DAEMON_H */
diff -c -r openssh-2.2.0p1/sshd.c openssh-2.2.0p1-pen1/sshd.c
*** openssh-2.2.0p1/sshd.c Tue Aug 29 02:05:50 2000
--- openssh-2.2.0p1-pen1/sshd.c Thu Jan 4 23:30:46 2001
***************
*** 552,558 ****
log_init(av0,
options.log_level == -1 ? SYSLOG_LEVEL_INFO : options.log_level,
options.log_facility == -1 ? SYSLOG_FACILITY_AUTH : options.log_facility,
! !silent && !inetd_flag);
/* Read server configuration options from the configuration file. */
read_server_config(&options, config_file_name);
--- 552,558 ----
log_ini...
2001 Feb 12
0
log-server.c patch: adding tag to every log output.
...turn;
switch (level) {
- case SYSLOG_LEVEL_ERROR:
- txt = "error";
- pri = LOG_ERR;
- break;
case SYSLOG_LEVEL_FATAL:
! txt = "fatal";
pri = LOG_ERR;
break;
case SYSLOG_LEVEL_INFO:
case SYSLOG_LEVEL_VERBOSE:
pri = LOG_INFO;
break;
case SYSLOG_LEVEL_DEBUG1:
! txt = "debug1";
pri = LOG_DEBUG;
break;
! case SYSLOG_LEVEL_DEBUG2:
! txt = "debug2";...
2016 Dec 28
2
certificates keys on pkcs11 devices
Hi,
I have not found any way to use a Certificate with ssh-agent when my Key is
stored on a pkcs11 device. I can add my key with
ssh-add -s /usr/local/lib/opensc-pkcs11.so
but
ssh-add -s /usr/local/lib/opensc-pkcs11.so ~/.ssh/mykey-cert.pub
does not add the certificate to my agent. As far as I undestand, in
ssh-add.c line 580
if (pkcs11provider != NULL) {
if (update_card(agent_fd,
2018 Nov 19
2
[PATCH] openssl-compat: Test for OpenSSL_add_all_algorithms before using.
OpenSSL 1.1.0 has deprecated this function.
---
configure.ac | 1 +
openbsd-compat/openssl-compat.c | 2 ++
openbsd-compat/openssl-compat.h | 4 ++++
3 files changed, 7 insertions(+)
diff --git a/configure.ac b/configure.ac
index 3f7fe2cd..db2aade8 100644
--- a/configure.ac
+++ b/configure.ac
@@ -2710,6 +2710,7 @@ if test "x$openssl" = "xyes" ; then
])
2024 Apr 25
1
[PATCH] Enable ssh_config to set LogPath option (-E)
...;t specify both -y and -E");
- if (logfile != NULL)
- log_redirect_stderr_to(logfile);
+ if (options.log_path != NULL)
+ log_redirect_stderr_to(options.log_path);
log_init(argv0,
options.log_level == SYSLOG_LEVEL_NOT_SET ?
SYSLOG_LEVEL_INFO : options.log_level,
--
2.39.2
2002 Mar 26
1
Two patches for OpenSSH 3.1p1
...break;
case 'i':
inetd_flag = 1;
break;
***************
*** 706,719 ****
/*
* Force logging to stderr until we have loaded the private host
! * key (unless started from inetd)
*/
log_init(__progname,
options.log_level == SYSLOG_LEVEL_NOT_SET ?
SYSLOG_LEVEL_INFO : options.log_level,
options.log_facility == SYSLOG_FACILITY_NOT_SET ?
SYSLOG_FACILITY_AUTH : options.log_facility,
! !inetd_flag);
#ifdef _CRAY
/* Cray can define user privs drop all prives now!
--- 713,726 ----
/*
* Force logging to stderr until we have loaded...
2024 Jun 27
1
An Analysis of the DHEat DoS Against SSH in Cloud Environments
...uot;, the
system idle time averaged over 60 seconds was 50%. The
/var/log/auth.log file grew 73MB in this time (nearly 400,000 lines
were messages produced by the new PerSourcePenalties logging in
sshd.c:627).
Next, I modified the logging in sshd.c:627 to always use
SYSLOG_LEVEL_DEBUG1 instead of SYSLOG_LEVEL_INFO. Re-running the above
test resulted in 73% average idle time and 8KB of log growth.
Lastly, from an m7i.2xlarge source EC2 instance in AWS, I targeted an
m7i.large instance using "ssh-audit --dheat=4:diffie-hellman-group18-
sha512:4 target_host". In my original research article, this c...
2009 Feb 13
2
when to display a banner
...{
char *msg, *raw, *lang;
u_int len;
debug3("input_userauth_banner");
+ if (!isatty(1) || !isatty(2)) return;
raw = packet_get_string(&len);
lang = packet_get_string(NULL);
if (options.log_level >= SYSLOG_LEVEL_INFO) {
what i think this will accomplish is that if one of the ssh client
programs is called normally by a user, the banner will be displayed.
if however either stdout or stderr is redirected like you would do in
an automated script, the banner will be suppressed.
can anyone think of any unintended s...
2003 Sep 10
3
[PATCH] No extern declarations of optarg & co if getopt.h is available
...=====
RCS file: /cvs/openssh_cvs/sftp.c,v
retrieving revision 1.38
diff -p -u -r1.38 sftp.c
--- sftp.c 21 Aug 2003 23:34:41 -0000 1.38
+++ sftp.c 10 Sep 2003 18:59:00 -0000
@@ -129,8 +129,10 @@ main(int argc, char **argv)
char *ssh_program = _PATH_SSH_PROGRAM, *sftp_direct = NULL;
LogLevel ll = SYSLOG_LEVEL_INFO;
arglist args;
+#ifndef HAVE_GETOPT_H
extern int optind;
extern char *optarg;
+#endif
__progname = ssh_get_progname(argv[0]);
args.list = NULL;
Index: ssh-add.c
===================================================================
RCS file: /cvs/openssh_cvs/ssh-add.c,v
retrieving revision...
2024 Feb 08
12
[Bug 3666] New: sshd crash
https://bugzilla.mindrot.org/show_bug.cgi?id=3666
Bug ID: 3666
Summary: sshd crash
Product: Portable OpenSSH
Version: 8.2p1
Hardware: Other
OS: Linux
Status: NEW
Severity: critical
Priority: P5
Component: sshd
Assignee: unassigned-bugs at mindrot.org
Reporter:
2000 Oct 30
2
Minor fixes for openssh-SNAP-20001028
...-snap20001028/log-server.c Mon Oct 30 14:42:31 2000
@@ -46,7 +46,7 @@
#ifdef HAVE___PROGNAME
extern char *__progname;
#else /* HAVE___PROGNAME */
-static const char *__progname = "sshd";
+static const char *__progname = NULL;
#endif /* HAVE___PROGNAME */
static LogLevel log_level = SYSLOG_LEVEL_INFO;
@@ -118,6 +118,10 @@
exit(1);
}
log_on_stderr = on_stderr;
+ if (__progname == NULL)
+ __progname = av0;
+ if (! log_on_stderr)
+ openlog(__progname, LOG_PID, log_facility);
}
#define MSGBUFSIZ 1024
2024 Jun 25
3
An Analysis of the DHEat DoS Against SSH in Cloud Environments
On Wed, 2024-06-19 at 16:11 -0400, Joseph S. Testa II wrote:
> I suppose in the next few days, I'll try reproducing my original
> steps
> with the new version and see what happens.
I managed to do some limited testing with a local VM, and the results
are... interesting.
I installed openssh-SNAP-20240626.tar.gz on a fresh and fully-updated
Ubuntu Linux 24.04 LTS VM with 1 vCPU.
2002 Feb 05
3
COPY_SIZE #define
...] [-b batchfile] [-F config] [-o option] [-s subsystem|path]\n"
- " [-S program] [user@]host[:file [file]]\n");
+ " [-B bufsize] [-S program] [user@]host[:file [file]]\n");
exit(1);
}
@@ -122,8 +123,11 @@ main(int argc, char **argv)
ll = SYSLOG_LEVEL_INFO;
infile = stdin; /* Read from STDIN unless changed by -b */
- while ((ch = getopt(argc, argv, "1hvCo:s:S:b:F:")) != -1) {
+ while ((ch = getopt(argc, argv, "1hvCo:s:S:b:F:B:")) != -1) {
switch (ch) {
+ case 'B':
+ COPY_SIZE = atoi(optarg);
+ break;
case &...
2000 Aug 25
1
[patch] configurable ssh_prng_cmds
...and_file; /* globally def in ssh.h */
+ goto parse_string;
+
default:
fatal("process_config_line: Unimplemented opcode %d", opcode);
}
@@ -788,6 +795,8 @@
options->user_hostfile2 = SSH_USER_HOSTFILE2;
if (options->log_level == (LogLevel) - 1)
options->log_level = SYSLOG_LEVEL_INFO;
+ if (ssh_prng_command_file == NULL)
+ ssh_prng_command_file = xstrdup(SSH_PRNG_COMMAND_FILE);
/* options->proxy_command should not be set by default */
/* options->user will be set in the main program if appropriate */
/* options->hostname will be set in the main pro...
2010 Mar 06
1
ssh-keyscan bug (not really exploitable)
...= 2;
- if (lb->errfun)
- (*lb->errfun)("linebuf (%s): realloc failed\n",
- lb->filename);
- return (NULL);
- }
- lb->buf = p;
- }
-}
-
static int
fdlim_get(int hard)
{
@@ -709,8 +593,10 @@ int
main(int argc, char **argv)
{
int debug_flag = 0, log_level = SYSLOG_LEVEL_INFO;
- int opt, fopt_count = 0;
- char *tname;
+ int opt, fopt_count = 0, j;
+ char *tname, *line;
+ size_t i, line_len;
+ FILE *fp;
extern int optind;
extern char *optarg;
@@ -808,20 +694,52 @@ main(int argc, char **argv)
read_wait_nfdset = howmany(maxfd, NFDBITS);
read_wait = xcalloc(read_w...